|
|
@@ -0,0 +1,115 @@
|
|
|
1
|
+# Project Progress Update
|
|
|
2
|
+
|
|
|
3
|
+Date: February 13, 2026
|
|
|
4
|
+Project: FoodProject SOC Platform (Wazuh + Shuffle + IRIS-web + SOC Integrator)
|
|
|
5
|
+
|
|
|
6
|
+## 1) Executive Summary
|
|
|
7
|
+
|
|
|
8
|
+The MVP platform is operational and running end-to-end in the lab environment.
|
|
|
9
|
+Core integrations are in place:
|
|
|
10
|
+- Detection: Wazuh
|
|
|
11
|
+- Automation: Shuffle
|
|
|
12
|
+- Case management: IRIS-web (replacing DFIRTrack)
|
|
|
13
|
+- Escalation (MVP): PagerDuty Stub
|
|
|
14
|
+- Orchestration/API layer: soc-integrator
|
|
|
15
|
+
|
|
|
16
|
+All major containers are currently up, and key health checks are passing.
|
|
|
17
|
+
|
|
|
18
|
+## 2) Completed Work
|
|
|
19
|
+
|
|
|
20
|
+### Platform orchestration and operations
|
|
|
21
|
+- Combined stack runner created and improved (`run-combined-stack.sh`)
|
|
|
22
|
+- Added command support for:
|
|
|
23
|
+ - `up`, `down`, `logs`, `status`, `help`
|
|
|
24
|
+ - per-target control (`wazuh`, `iris`, `shuffle`, `pagerduty`, `integrator`)
|
|
|
25
|
+- Added consolidated health/status script (`soc-status.sh`)
|
|
|
26
|
+
|
|
|
27
|
+### Integration architecture
|
|
|
28
|
+- Connected Wazuh, Shuffle, IRIS-web, PagerDuty Stub, and soc-integrator on shared network
|
|
|
29
|
+- Resolved startup conflicts and runtime issues (port, compose, routing compatibility)
|
|
|
30
|
+
|
|
|
31
|
+### SOC Integrator (MVP)
|
|
|
32
|
+- Added/validated integration APIs for:
|
|
|
33
|
+ - Wazuh
|
|
|
34
|
+ - Shuffle
|
|
|
35
|
+ - IRIS-web
|
|
|
36
|
+ - PagerDuty Stub
|
|
|
37
|
+- Implemented MVP orchestration endpoints:
|
|
|
38
|
+ - `POST /mvp/incidents/ingest`
|
|
|
39
|
+ - `POST /mvp/ioc/evaluate`
|
|
|
40
|
+ - `POST /mvp/vpn/evaluate`
|
|
|
41
|
+ - `GET /mvp/config/policies`
|
|
|
42
|
+ - `PUT /mvp/config/policies`
|
|
|
43
|
+ - `GET /mvp/health/dependencies`
|
|
|
44
|
+- Added internal API-key protection for mutation endpoints
|
|
|
45
|
+
|
|
|
46
|
+### Persistence layer
|
|
|
47
|
+- Added PostgreSQL service for soc-integrator (`soc-integrator-db`)
|
|
|
48
|
+- Added incident/policy/audit schema and startup initialization
|
|
|
49
|
+- Enabled deduplication and audit tracking for incident processing
|
|
|
50
|
+
|
|
|
51
|
+### Testing utilities and documentation
|
|
|
52
|
+- Added Wazuh test-event injection script:
|
|
|
53
|
+ - `scripts/send-wazuh-test-events.sh`
|
|
|
54
|
+- Added root project docs:
|
|
|
55
|
+ - `README.md`
|
|
|
56
|
+- Added root ignore rules:
|
|
|
57
|
+ - `.gitignore`
|
|
|
58
|
+
|
|
|
59
|
+## 3) Current Live Status (Lab)
|
|
|
60
|
+
|
|
|
61
|
+Current stack status: **UP**
|
|
|
62
|
+
|
|
|
63
|
+Healthy/available components:
|
|
|
64
|
+- Wazuh manager, indexer, dashboard
|
|
|
65
|
+- IRIS-web app/nginx/worker/db/rabbitmq
|
|
|
66
|
+- Shuffle backend/frontend/opensearch/orborus
|
|
|
67
|
+- PagerDuty Stub
|
|
|
68
|
+- soc-integrator + soc-integrator-db
|
|
|
69
|
+
|
|
|
70
|
+Endpoint checks:
|
|
|
71
|
+- Wazuh Dashboard: OK
|
|
|
72
|
+- Wazuh API: OK (auth-protected, expected 401 on unauthenticated root)
|
|
|
73
|
+- IRIS Web: OK
|
|
|
74
|
+- Shuffle Frontend: OK
|
|
|
75
|
+- Shuffle Backend: reachable
|
|
|
76
|
+- Shuffle OpenSearch: reachable (auth-protected)
|
|
|
77
|
+- PagerDuty Stub: OK
|
|
|
78
|
+- soc-integrator `/health`: OK
|
|
|
79
|
+
|
|
|
80
|
+## 4) In Progress / Remaining for Customer UAT
|
|
|
81
|
+
|
|
|
82
|
+1. Detection content tuning
|
|
|
83
|
+- Fine-tune Wazuh rules/decoders for customer log patterns and false-positive reduction
|
|
|
84
|
+
|
|
|
85
|
+2. Use-case calibration
|
|
|
86
|
+- Validate risk/severity mapping per approved use cases
|
|
|
87
|
+- Tune exception list and threshold logic (especially VPN geo anomaly)
|
|
|
88
|
+
|
|
|
89
|
+3. UAT evidence package
|
|
|
90
|
+- Capture deterministic UAT scenarios and outputs for:
|
|
|
91
|
+ - IOC flow
|
|
|
92
|
+ - VPN outside-TH flow
|
|
|
93
|
+ - IRIS case creation/update
|
|
|
94
|
+ - PagerDuty Stub escalation path
|
|
|
95
|
+
|
|
|
96
|
+4. Production hardening items
|
|
|
97
|
+- Rotate default/local secrets used in lab config
|
|
|
98
|
+- Lock down internal API keys and access boundaries
|
|
|
99
|
+
|
|
|
100
|
+## 5) Risks / Notes
|
|
|
101
|
+
|
|
|
102
|
+- Current escalation target is **PagerDuty Stub** by design for MVP.
|
|
|
103
|
+ Real PagerDuty production integration is the next stage.
|
|
|
104
|
+- Some Wazuh config certificate directories are root-owned in the local lab clone, which may affect local git add operations if not excluded/fixed.
|
|
|
105
|
+
|
|
|
106
|
+## 6) Next Milestone (Proposed)
|
|
|
107
|
+
|
|
|
108
|
+Next milestone: **MVP UAT Completion**
|
|
|
109
|
+
|
|
|
110
|
+Target outputs:
|
|
|
111
|
+- Approved UAT checklist execution
|
|
|
112
|
+- Tuned policy thresholds for customer environment
|
|
|
113
|
+- Signed-off incident lifecycle flow:
|
|
|
114
|
+ Wazuh event -> soc-integrator decision -> IRIS case -> PagerDuty Stub escalation
|
|
|
115
|
+
|